Three out of four companies have paid a ransom for their data due to a ransomware attack. A third of companies are still unable to restore their own data. This is shown by the “Ransomware Trends Report 2022” from backup, recovery and data management specialist Veeam, for which 1,000 IT executives were surveyed. ( HERE )

Patches and upgrades

72 percent of companies were partially or fully affected by attacks on their backup repositories, drastically reducing the ability to recover data without paying the ransom. According to Veeam, 80 percent of successful attacks targeted known vulnerabilities, highlighting the importance of patches and software upgrades.

Almost all attackers attempted to render backup repositories unusable to prevent the victim from restoring the data without paying the ransom. “Paying cybercriminals to restore data is not a data protection strategy,” emphasizes Veeam CTO Danny Allan, emphasizing the need for efficient protection measures in advance.

No access despite ransom

According to the report, there is a one in three chance that paying the ransom will result in no data. Notably, 19 percent of companies did not pay the ransom because they were able to recover their own data. That's what the remaining 81 percent must strive for: recovering data without paying the ransom, they say.

Survey participants confirm that 94 percent of attackers attempted to destroy backup repositories and in 72 percent of cases this strategy was at least partially successful. This “cutting off a company's lifeline” is a popular attack strategy because it increases the likelihood that victims will have no choice but to pay the ransom.

Conclusion

75% of all companies have already been affected by ransomware attacks, in which important company data is encrypted by the attackers in such a way that the company can only regain access to it by paying a ransom. Accepting the ransom payment is no guarantee that you will regain access to your own data. Every third payment comes to nothing. During the attacks, the backups are often attacked and destroyed, so that the blackmailed companies no longer have a fallback solution.

This might also be of interest: GMail stops fewer attacks than you think

Source: Pressetext.com


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )